HomeSort by relevance Sort by last modified time
    Searched refs:CRYPT_OK (Results 1 - 25 of 259) sorted by null

1 2 3 4 5 6 7 8 91011

  /external/dropbear/libtomcrypt/src/pk/asn1/der/boolean/
der_length_boolean.c 22 @return CRYPT_OK if successful
28 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/ecc/
ltc_ecc_map.c 31 @return CRYPT_OK on success
42 if ((err = mp_init_multi(&t1, &t2, NULL)) != CRYPT_OK) {
47 if ((err = mp_montgomery_reduce(P->z, modulus, mp)) != CRYPT_OK) { goto done; }
50 if ((err = mp_invmod(P->z, modulus, t1)) != CRYPT_OK) { goto done; }
53 if ((err = mp_sqr(t1, t2)) != CRYPT_OK) { goto done; }
54 if ((err = mp_mod(t2, modulus, t2)) != CRYPT_OK) { goto done; }
55 if ((err = mp_mul(t1, t2, t1)) != CRYPT_OK) { goto done; }
56 if ((err = mp_mod(t1, modulus, t1)) != CRYPT_OK) { goto done; }
59 if ((err = mp_mul(P->x, t2, P->x)) != CRYPT_OK) { goto done; }
60 if ((err = mp_montgomery_reduce(P->x, modulus, mp)) != CRYPT_OK) { goto done;
    [all...]
ltc_ecc_projective_add_point.c 33 @return CRYPT_OK on success
46 if ((err = mp_init_multi(&t1, &t2, &x, &y, &z, NULL)) != CRYPT_OK) {
51 if ((err = mp_sub(modulus, Q->y, t1)) != CRYPT_OK) { goto done; }
60 if ((err = mp_copy(P->x, x)) != CRYPT_OK) { goto done; }
61 if ((err = mp_copy(P->y, y)) != CRYPT_OK) { goto done; }
62 if ((err = mp_copy(P->z, z)) != CRYPT_OK) { goto done; }
67 if ((err = mp_sqr(Q->z, t1)) != CRYPT_OK) { goto done; }
68 if ((err = mp_montgomery_reduce(t1, modulus, mp)) != CRYPT_OK) { goto done; }
70 if ((err = mp_mul(t1, x, x)) != CRYPT_OK) { goto done; }
71 if ((err = mp_montgomery_reduce(x, modulus, mp)) != CRYPT_OK) { goto done;
    [all...]
ltc_ecc_projective_dbl_point.c 32 @return CRYPT_OK on success
44 if ((err = mp_init_multi(&t1, &t2, NULL)) != CRYPT_OK) {
49 if ((err = mp_copy(P->x, R->x)) != CRYPT_OK) { goto done; }
50 if ((err = mp_copy(P->y, R->y)) != CRYPT_OK) { goto done; }
51 if ((err = mp_copy(P->z, R->z)) != CRYPT_OK) { goto done; }
55 if ((err = mp_sqr(R->z, t1)) != CRYPT_OK) { goto done; }
56 if ((err = mp_montgomery_reduce(t1, modulus, mp)) != CRYPT_OK) { goto done; }
58 if ((err = mp_mul(R->z, R->y, R->z)) != CRYPT_OK) { goto done; }
59 if ((err = mp_montgomery_reduce(R->z, modulus, mp)) != CRYPT_OK) { goto done; }
61 if ((err = mp_add(R->z, R->z, R->z)) != CRYPT_OK) { goto done;
    [all...]
ecc_import.c 31 if ((err = mp_init_multi(&prime, &b, &t1, &t2, NULL)) != CRYPT_OK) {
36 if ((err = mp_read_radix(prime, key->dp->prime, 16)) != CRYPT_OK) { goto error; }
37 if ((err = mp_read_radix(b, key->dp->B, 16)) != CRYPT_OK) { goto error; }
40 if ((err = mp_sqr(key->pubkey.y, t1)) != CRYPT_OK) { goto error; }
43 if ((err = mp_sqr(key->pubkey.x, t2)) != CRYPT_OK) { goto error; }
44 if ((err = mp_mod(t2, prime, t2)) != CRYPT_OK) { goto error; }
45 if ((err = mp_mul(key->pubkey.x, t2, t2)) != CRYPT_OK) { goto error; }
48 if ((err = mp_sub(t1, t2, t1)) != CRYPT_OK) { goto error; }
51 if ((err = mp_add(t1, key->pubkey.x, t1)) != CRYPT_OK) { goto error; }
52 if ((err = mp_add(t1, key->pubkey.x, t1)) != CRYPT_OK) { goto error;
    [all...]
ecc_verify_hash.c 44 @return CRYPT_OK if successful (even if the signature is not valid)
70 if ((err = mp_init_multi(&r, &s, &v, &w, &u1, &u2, &p, &e, &m, NULL)) != CRYPT_OK) {
86 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
91 if ((err = mp_read_radix(p, (char *)key->dp->order, 16)) != CRYPT_OK) { goto error; }
94 if ((err = mp_read_radix(m, (char *)key->dp->prime, 16)) != CRYPT_OK) { goto error; }
103 if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, (int)hashlen)) != CRYPT_OK) { goto error; }
106 if ((err = mp_invmod(s, p, w)) != CRYPT_OK) { goto error; }
109 if ((err = mp_mulmod(e, w, p, u1)) != CRYPT_OK) { goto error; }
112 if ((err = mp_mulmod(r, w, p, u2)) != CRYPT_OK) { goto error; }
115 if ((err = mp_read_radix(mG->x, (char *)key->dp->Gx, 16)) != CRYPT_OK) { goto error;
    [all...]
ecc_sign_hash.c 35 @return CRYPT_OK if successful
60 if ((err = prng_is_valid(wprng)) != CRYPT_OK) {
66 if ((err = mp_init_multi(&r, &s, &p, &e, NULL)) != CRYPT_OK) {
69 if ((err = mp_read_radix(p, (char *)key->dp->order, 16)) != CRYPT_OK) { goto errnokey; }
70 if ((err = mp_read_unsigned_bin(e, (unsigned char *)in, (int)inlen)) != CRYPT_OK) { goto errnokey; }
74 if ((err = ecc_make_key_ex(prng, wprng, &pubkey, key->dp)) != CRYPT_OK) {
79 if ((err = mp_mod(pubkey.pubkey.x, p, r)) != CRYPT_OK) { goto error; }
85 if ((err = mp_invmod(pubkey.k, p, pubkey.k)) != CRYPT_OK) { goto error; } /* k = 1/k */
86 if ((err = mp_mulmod(key->k, r, p, s)) != CRYPT_OK) { goto error; } /* s = xr */
87 if ((err = mp_add(e, s, s)) != CRYPT_OK) { goto error; } /* s = e + xr *
    [all...]
  /external/dropbear/libtomcrypt/src/pk/dsa/
dsa_verify_key.c 24 @return CRYPT_OK if successful
38 if ((err = mp_prime_is_prime(key->q, 8, &res)) != CRYPT_OK) {
42 return CRYPT_OK;
45 if ((err = mp_prime_is_prime(key->p, 8, &res)) != CRYPT_OK) {
49 return CRYPT_OK;
54 return CRYPT_OK;
56 if ((err = mp_init_multi(&tmp, &tmp2, NULL)) != CRYPT_OK) { return err; }
57 if ((err = mp_sub_d(key->p, 1, tmp)) != CRYPT_OK) { goto error; }
59 err = CRYPT_OK;
65 err = CRYPT_OK;
    [all...]
  /external/dropbear/libtomcrypt/src/pk/asn1/der/choice/
der_decode_choice.c 26 @return CRYPT_OK on success
55 if (der_decode_integer(in, *inlen, data) == CRYPT_OK) {
56 if (der_length_integer(data, &z) == CRYPT_OK) {
59 return CRYPT_OK;
65 if (der_decode_short_integer(in, *inlen, data) == CRYPT_OK) {
66 if (der_length_short_integer(size, &z) == CRYPT_OK) {
69 return CRYPT_OK;
75 if (der_decode_bit_string(in, *inlen, data, &size) == CRYPT_OK) {
76 if (der_length_bit_string(size, &z) == CRYPT_OK) {
80 return CRYPT_OK;
    [all...]
  /external/dropbear/libtomcrypt/src/prngs/
rng_make_prng.c 24 @return CRYPT_OK if successful
35 if ((err = prng_is_valid(wprng)) != CRYPT_OK) {
43 if ((err = prng_descriptor[wprng].start(prng)) != CRYPT_OK) {
52 if ((err = prng_descriptor[wprng].add_entropy(buf, (unsigned long)bits, prng)) != CRYPT_OK) {
56 if ((err = prng_descriptor[wprng].ready(prng)) != CRYPT_OK) {
63 return CRYPT_OK;
sprng.c 41 @return CRYPT_OK if successful
45 return CRYPT_OK;
53 @return CRYPT_OK if successful
57 return CRYPT_OK;
63 @return CRYPT_OK if successful
67 return CRYPT_OK;
86 @return CRYPT_OK if successful
90 return CRYPT_OK;
98 @return CRYPT_OK if successful
105 return CRYPT_OK;
    [all...]
  /external/dropbear/libtomcrypt/src/pk/katja/
katja_make_key.c 26 @return CRYPT_OK if successful, upon error all allocated ram is freed
40 if ((err = prng_is_valid(wprng)) != CRYPT_OK) {
44 if ((err = mp_init_multi(&p, &q, &tmp1, &tmp2, NULL)) != CRYPT_OK) {
52 if ((err = rand_prime(q, -size, prng, wprng)) != CRYPT_OK) { goto done; }
53 if ((err = mp_sub_d(q, 1, tmp1)) != CRYPT_OK) { goto done; }
57 if ((err = rand_prime(p, size+1, prng, wprng)) != CRYPT_OK) { goto done; }
58 if ((err = mp_gcd(p, tmp1, tmp2)) != CRYPT_OK) { goto done; }
63 &key->qP, &key->p, &key->q, &key->pq, NULL)) != CRYPT_OK) {
68 if ((err = mp_copy( p, key->p)) != CRYPT_OK) { goto error2; }
69 if ((err = mp_copy( q, key->q)) != CRYPT_OK) { goto error2;
    [all...]
  /external/dropbear/libtomcrypt/src/misc/crypt/
crypt_fsa.c 32 if ((err = register_cipher(p)) != CRYPT_OK) {
39 if ((err = register_hash(p)) != CRYPT_OK) {
46 if ((err = register_prng(p)) != CRYPT_OK) {
53 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/rsa/
rsa_make_key.c 27 @return CRYPT_OK if successful, upon error all allocated ram is freed
45 if ((err = prng_is_valid(wprng)) != CRYPT_OK) {
49 if ((err = mp_init_multi(&p, &q, &tmp1, &tmp2, &tmp3, NULL)) != CRYPT_OK) {
54 if ((err = mp_set_int(tmp3, e)) != CRYPT_OK) { goto errkey; } /* tmp3 = e */
58 if ((err = rand_prime( p, size/2, prng, wprng)) != CRYPT_OK) { goto errkey; }
59 if ((err = mp_sub_d( p, 1, tmp1)) != CRYPT_OK) { goto errkey; } /* tmp1 = p-1 */
60 if ((err = mp_gcd( tmp1, tmp3, tmp2)) != CRYPT_OK) { goto errkey; } /* tmp2 = gcd(p-1, e) */
65 if ((err = rand_prime( q, size/2, prng, wprng)) != CRYPT_OK) { goto errkey; }
66 if ((err = mp_sub_d( q, 1, tmp1)) != CRYPT_OK) { goto errkey; } /* tmp1 = q-1 */
67 if ((err = mp_gcd( tmp1, tmp3, tmp2)) != CRYPT_OK) { goto errkey; } /* tmp2 = gcd(q-1, e) *
    [all...]
rsa_exptmod.c 28 @return CRYPT_OK if successful
54 if ((err = mp_init_multi(&tmp, &tmpa, &tmpb, NULL)) != CRYPT_OK) { return err; }
55 if ((err = mp_read_unsigned_bin(tmp, (unsigned char *)in, (int)inlen)) != CRYPT_OK) { goto error; }
66 if ((err = mp_exptmod(tmp, key->dP, key->p, tmpa)) != CRYPT_OK) { goto error; }
69 if ((err = mp_exptmod(tmp, key->dQ, key->q, tmpb)) != CRYPT_OK) { goto error; }
72 if ((err = mp_sub(tmpa, tmpb, tmp)) != CRYPT_OK) { goto error; }
73 if ((err = mp_mulmod(tmp, key->qP, key->p, tmp)) != CRYPT_OK) { goto error; }
76 if ((err = mp_mul(tmp, key->q, tmp)) != CRYPT_OK) { goto error; }
77 if ((err = mp_add(tmp, tmpb, tmp)) != CRYPT_OK) { goto error; }
80 if ((err = mp_exptmod(tmp, key->e, key->N, tmp)) != CRYPT_OK) { goto error;
    [all...]
  /external/dropbear/libtomcrypt/src/modes/cbc/
cbc_done.c 22 @return CRYPT_OK on success
29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) {
33 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/modes/cfb/
cfb_done.c 22 @return CRYPT_OK on success
29 if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) {
33 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/modes/ctr/
ctr_done.c 22 @return CRYPT_OK on success
29 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) {
33 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/modes/ecb/
ecb_done.c 22 @return CRYPT_OK on success
29 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) {
33 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/modes/f8/
f8_done.c 22 @return CRYPT_OK on success
29 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) {
33 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/modes/lrw/
lrw_done.c 23 @return CRYPT_OK if successful
31 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) {
36 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/modes/ofb/
ofb_done.c 22 @return CRYPT_OK on success
29 if ((err = cipher_is_valid(ofb->cipher)) != CRYPT_OK) {
33 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/mac/hmac/
hmac_file.c 28 @return CRYPT_OK if successful, CRYPT_NOP if file support has been disabled
48 if((err = hash_is_valid(hash)) != CRYPT_OK) {
52 if ((err = hmac_init(&hmac, hash, key, keylen)) != CRYPT_OK) {
64 if ((err = hmac_process(&hmac, buf, (unsigned long)x)) != CRYPT_OK) {
76 if ((err = hmac_done(&hmac, out, outlen)) != CRYPT_OK) {
84 return CRYPT_OK;
hmac_memory.c 29 @return CRYPT_OK if successful
45 if ((err = hash_is_valid(hash)) != CRYPT_OK) {
61 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) {
65 if ((err = hmac_process(hmac, in, inlen)) != CRYPT_OK) {
69 if ((err = hmac_done(hmac, out, outlen)) != CRYPT_OK) {
73 err = CRYPT_OK;
  /external/dropbear/libtomcrypt/src/mac/omac/
omac_memory.c 29 @return CRYPT_OK if successful
45 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
61 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) {
64 if ((err = omac_process(omac, in, inlen)) != CRYPT_OK) {
67 if ((err = omac_done(omac, out, outlen)) != CRYPT_OK) {
71 err = CRYPT_OK;

Completed in 87 milliseconds

1 2 3 4 5 6 7 8 91011